|Publication number||US5937110 A|
|Application number||US 08/772,158|
|Publication date||Aug 10, 1999|
|Filing date||Dec 20, 1996|
|Priority date||Dec 20, 1996|
|Also published as||US6208771, US6310988|
|Publication number||08772158, 772158, US 5937110 A, US 5937110A, US-A-5937110, US5937110 A, US5937110A|
|Inventors||Glen W. Petrie, David L. Hecht|
|Original Assignee||Xerox Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (5), Referenced by (148), Classifications (15), Legal Events (6)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This invention relates to the construction of multi-dimensional address spaces in the image domain and, more particularly, to self-clocking glyph instantiations of such address spaces.
Self-clocking glyph codes, such as Xerox DataGlyphs, are attractive for embedding machine readable digital information in images of various types, including ordinary hardcopy documents. These codes have substantial tolerance to image distortion and noise because the digital information they encode is embedded in and fully defined by explicit machine readable marks (i.e., "glyphs"). These glyphs not only encode the information that is embedded in the code, but also define the sample clock that is employed to extract that information from the code, so they are responsible for the "self-clocking" property of the code as well as the distortion and noise tolerance.
Another known advantage of self-clocking glyph codes is that they ordinarily have an unobtrusive visual appearance. This is especially so of codes which are composed of glyphs which are written on a two dimensional spatially periodic pattern of centers, such as a regular lattice-like pattern of centers, because the spatial periodicity of the glyphs causes the code to have a more or less uniformly textured appearance. For example, logically ordered single bit digital quanta typically are encoded by respective elongated slash-like glyphs which are written on a two dimensional, spatially periodic pattern of centers in accordance with a predetermined spatial formatting rule, with the individual glyphs being tilted to the left and right of vertical by approximately +45° and -45° for encoding logical "0's" and "1's", respectively. The mutual orthogonality of the glyph encodings for the two logical states of these single bit digital quanta enhances the discriminability of the code sufficiently to enable the embedded information to be recovered, even when the code pattern is written on a sufficiently fine grain pattern of center to cause the code pattern to have a generally uniform grayscale appearance. It, however, is to be noted that it also has been shown that self-clocking glyph codes can be designed to encode multi-bit digital quanta in the glyphs.
Prior proposals have dealt with the general subject of constructing address spaces in the image domain by encoding cyclical pseudo-noise digital bit sequences (sometimes referred to as "PN sequences") and other types of maximal length-like digital bit sequences (i.e., sequences of length, L, in which every N-bit long subsequence is unique) in two dimensional spatially periodic self-clocking glyph code patterns. One of the unifying themes of these prior proposals is that they recommend constructing two dimensional address spaces by mapping at least two bit sequences of the foregoing type into such a code pattern so that these bit sequences are encoded to propagate in predetermined directions along respective non-parallel lines of glyphs. While it has been shown that the bit sequences need not be mapped into the code pattern in alignment with the principal axes thereof, it often is desirable to employ such mappings to reduce the computations that are required to determine the relative addresses of the glyphs in standard Cartesian coordinates (i.e., "x" and "y" parameters expressed in units of glyphs). Furthermore, it is known that the encodings of these bit sequences may completely or partially span the glyph code pattern, so it is to be understood that the addressing that is afforded by them is effective only within that portion of the glyph code pattern that projects onto both of the encodings. Moreover, the aforementioned bit sequences may be mapped into the glyphs on these non-parallel lines at unitary or fractional duty ratios, but it has been recognized that mappings preferably are spatially cyclical for applications in which it is desired to compute relative addresses for glyphs within the address space.
Every bit in a maximal bit length sequence resides at a predetermined uniquely determinable logical position within the sequence. Accordingly, an ordered index of integers is commonly employed to distinguish those bits from each other on the basis of their respective ordinal logical positions within the sequence. These positionally dependent index numbers can, of course, be employed for selectively addressing the glyphs which encode the bits of such a sequence. However, addressing information in at least one additional dimension is required to uniquely identify the spatial locations of those glyphs or any other glyphs that are included within a two dimensional glyph code pattern. These unique identifiers of the individual glyphs are referred to as "absolute addresses" because they identify the unique locations at which the individual glyphs reside within the glyph code pattern.
As is known, the spatial address (i.e., the absolute address) of almost any given glyph in an address space of the foregoing type is identifiable, at least to a first approximation, by a metric which specifies the offset distances (if any) between the nominal center of the given glyph and the non-parallel lines of glyphs that encode the respective maximal length bit sequences, where these offsets are measured parallel to the principal axes of the code pattern and are expressed in units of glyphs. In applications where the maximal length sequences are encoded by glyphs on orthogonal lines which align with the principal axes of a self-clocking glyph code pattern that is written on a regular rectangular lattice of centers, the above-described metric reduces to an x/y coordinate pair which identifies the spatial location of the given glyph with substantial precision in a standard Cartesian coordinate system. Unfortunately, however, the intersections of the lines on which these maximal bit length sequences are encoded tend to restrict the freedom of design choice if there are glyphs at any of these intersections.
It has been shown that this unwanted limitation on the explicit spatial addressing of glyphs in self-clocking glyph code patterns can be avoided if the glyphs are written on a lattice of centers of predetermined width and/or height, so that there are a known or determinable fixed number of glyphs on every line of the code pattern along at least one of those dimensions. More particularly the solution that has been proposed for this special class of code patterns is to encode a maximal length bit sequence (or a combination of interleaved, relatively prime maximal length bit sequences) in the glyphs in a raster-like pattern which is selected to cause the logically ordered bits of the sequence to spatially propagate from side-to-side along a known dimension (say, the width) of the code pattern which is more gradually propagating along the other (e.g., the height) of the code pattern in, say, top-to-bottom order. This raster encoding of the maximal length bit sequence effectively "folds" the bit sequence into the code pattern module a known or computable number of glyphs (i.e., the number of glyphs that the code pattern contains along its known dimension). Accordingly, the spatial address of any given glyph within the code pattern can be computed in x/y coordinate space from the sequence index number of the bit that is encoded by the glyph by dividing the sequence index number of the bit by the known glyph count/line modules.
Unfortunately, this raster encoding style solution to the spatial addressing problem is not only limited to a constrained class of code patterns, but also tends to be computationally costly. The computational costs of this approach are elevated because the subsequence bit length, N, over which the maximal length bit sequence must be unique scales as a function of the square root of the address space that is being served. This scaling is an inherent consequence of the fact that the number of unique phases (or "bit index positions") of a maximal length bit sequence is given by N2 -1.
Clearly, therefore, it would be desirable to have a more flexible technique for embedding logically ordered address information in some or all of the glyphs of self-clocking glyph code patterns for more computationally efficiently identifying the unique spatial locations of individual glyphs within such code patterns. Indeed, it would be desirable to parameterize such code patterns in N-dimensional space so that these address spaces, or fragments of them, can be used for hierarchically identifying two and three dimensional objects.
Indeed, in accordance with this invention, machine readable fragments of a code pattern that is parameterized in N-dimensional space, where N≧2, are affixed to two or three dimensional physical objects, such that the objects are uniquely identified by the addresses of the machine readable address space fragments affixed thereto.
Still further objects of this invention will become apparent when the following detailed description is read in conjunction with the attached drawings, in which:
FIG. 1 illustrates a self-clocking glyph code pattern and a portion of its binary interpretation;
FIGS. 2-8 schematically illustrates two dimensional image domain address spaces that are constructed by embedding address information in self-clocking glyph code patterns or the like in accordance with this invention;
FIG. 9 illustrates a fragmentation of an address space of the type shown in FIGS. 2-8;
FIGS. 10-12 illustrate the labeling of address spaces of the type shown in FIGS. 2-8;
FIG. 13 illustrates an application of labeled address spaces of the type shown in FIGS. 10-12.
FIG. 14 illustrates, in fragmentary form, code labeling for image domain address space; and
FIG. 15 illustrates a system-level application of N-dimensional image domain address spaces, where N≧2.
While the invention is described in some detail hereinbelow with reference to certain illustrated embodiments, it is to be understood that it is not limited to those embodiments. On the contrary, the intent is to cover all modifications, alternative, and equivalents falling within the spirit and scope of the invention as defined by the appended claims.
A. Self Clocking Glyph Codes
Turning now to the drawings, and at this point especially to FIG. 1, there is a more or less conventional self-clocking glyph code pattern 21 which is composed of elongated slash-like marks or "glyphs" 22 and 23 that are written on a generally regular rectangular lattice of centers on a suitable recording medium 24. Suitably, the glyphs 22 and 23 are printed by a printer (not shown) operating at 300 d.p.i.-600 d.p.i. to write 4 pixel×4 pixel-7 pixel×7 pixel representations of the glyphs 22 and 23 on regularly spaced centers that are distributed widthwise and lengthwise of the recording medium 24 to produce the rectangular code pattern 21. The glyphs of these fine grain glyph code patterns are not easily resolved by the unaided human eye when the code patterns are viewed under standard lighting conditions and at normal reading distances, so the code pattern 21 typically has a generally uniform gray scale appearance. Nevertheless, the glyph code is still capable of effectively communicating machine readable digital information. To carry out this function, the glyphs 22 and 23 usually are titled to the left and right, at about +45° and -45° with respect to the longitudinal dimension of the recording medium 24 to encode binary "1's" and "0's", respectively, as shown at 25.
B. The Relative Phase of Parallel Propagating Embedded Maximal Length Bit Sequences as a Spatial Address Parameter
FIGS. 2-8 diagrammatically illustrate image domain address spaces which are constructed by embedding multiple instances of one (FIGS. 3 and 6) or two (FIGS. 2, 4, 5, 7 and 9) maximal length bit sequences ("Z" in FIGS. 3 and 6, "X" and "Y" in FIGS. 2, 4 and 5, and "U" and "V" in FIGS. 7 and 8) in a self-clocking is glyph code pattern 21 (FIG. 1). These maximal bit length sequences are encoded by the glyphs on parallel lines of the glyph code pattern to propagate in a predetermined direction, such as a left-to-right direction, from one side of the address space to the other. However, the relative phase, φR, of the bit sequences (or at least certain of the bit sequences--see FIG. 4) that are encoded on neighboring ones of these lines incrementally varies as a function of the transverse positioning of those lines in the address space (i.e., as a function of the position of the respective lines relative to the Y-axis of the address space). The phase shift corresponds to translating the code parallel to its linear direction by an integer number of bits.
In the address spaces shown in FIGS. 2, 3, and 5-8, the maximal length bit sequence encoded on all of the odd numbered lines are phase aligned. However, the sequences encoded on the other or even numbered lines are phased shifted to the right, in successive one bit position increments, so the transverse positioning of any given even numbered line in these address spaces is given by:
Y=2φR +1 (1)
φR =the phase of the sequence encoded on the given even numbered line relative to the phase of the sequence encoded a neighboring odded numbered line
Equation (1) can, of course, be restated for any constant incremental phase shift, Δφ, as follows: ##EQU1##
Furthermore, it follows from equation (1) that the relative transverse position of the sequence encoded on the immediately preceding odd numbered line is given by:
While the transverse positioning of the sequence encoded on the immediately following odd numbered line is given by:
Y=2(φR +1) (4)
The phase differences OR between the odd and even numbered lines can be computed in either order, provided that a consistent order is employed.
The best practice for identifying the location of a given glyph with respect to the transverse or Y-axis of such an address space is to capture a sufficiently large area of the address space to determine the phase of the sequence that is encoded on the line containing the given glyph relative to the phases of the sequences encoded on the next preceding and next following lines of the address space. The two-way relative phase analysis that is enabled by this three sequence phase determination effectively discriminates between odd and even numbered lines in the address space, even if one or more of the sequences has "rolled over" in the address space. As will be appreciated, the principal implication of this two-way relative phase analysis technique is that it requires that capture of a sufficiently large number of the bit encodings from each of the three sequences to phase lock on to each of those sequences. Typically, pattern matching (or sliding window correlation) process is employed to find the phase locked state in a maximal length bit sequence. For cases where the width, W, of the address space equals the length, L, of the maximal bit length sequence in question, this correlation process requires a capture of at least N bits sequence, where N is the unique subsequence bit length of the maximal bit length sequence to establish phase lock (preferably, the correlation process given approximately 2N bits or more to establish phase lock with a desirable higher degree of confidence in its correctness). Note the maximal PN sequence ordinal position can be correlated normally even in the neighborhood of rollover at the end of the code (the code is cyclic). If a truncated PN sequence or the like is used, a somewhat larger typical capture region (no more than twice the extent along the linear code direction) would be needed to assure unambiguous address determination. If any one of a family of sequences may be used, more glyphs in the sequence may be needed to distinguish allowed sequences.
As shown in dashed lines in FIG. 7, phase roll over can be avoided by reducing the effective address space by a factor of two, so that all phase shifts are in the same absolute direction (i.e., same sign sense). That, in turn, permits a one-way relative phase analysis to be used for determining the relative transverse positions (i.e., the positioning relative to the Y-axis) of the lines of such an address space glyphs on the odd and even numbered lines encode different maximal bit length sequences (such as at "X" and "Y" in FIGS. 2, and U and V in FIGS. 7 and 8) because the sequences themselves can then be used to distinguish between the odd and even numbered lines.
However, it is believed that the relative phase difference, φR, between the maximal length bit sequences propagating on any two neighboring lines of the address space can be determined from the difference between the sequence index numbers, i and j, of the bits of those respective sequences that are encoded by any transversely aligned glyphs on those respective lines. More particularly, it is believed phase difference φR can be determined from the difference, if any, of the sequence index numbers by (1) summing the index difference (i-j) with (2) the smallest integer multiple of the width, W, of the address space width which (3) yields a positive integer multiple that is (4) evenly divisible by the relative incremental phase shift of the respective sequences; (5) by dividing the positive integer that is found at step 3 to satisfy the condition specified by step 4; and by then (6) evaluating the quotient resulting from step 5 module the width, W (in glyphs), of the address space. While this formulation has not been fully tested for all cases, its effectivity has been confirmed with substantial rigor for the address space shown in FIG. 8 (i.e., where the maximal bit length sequences on the odd and even numbered lines are incrementally phase shifted; each by one bit sequence index position, but in opposite directions to provide a relative incremental phase shift of two bit positions. Further, its effectivity has been less rigorously confirmed for the address spaces of the type shown in FIG. 2 (i.e., incremental relative phase shift of just one bit index position.
As will be appreciated, the bit sequence indices of the unshifted maximal length bit sequences suitably are employed to identify the spatial location of the glyphs that encode those sequences with respect to the X-axis of the address space. Thus, once the spatial positions of the lines on which those sequences are encoded are located relative to the Y-axis of the address space, there is a unique x/y coordinate pair for identifying the spatial location of each of those glyphs is the address space. A similar process is employed to determine the x/y coordinate pairs for the glyphs that encode the phase shifted maximal length bit sequences, except the bit sequence indices of those sequences are normalized to account for the accumulated phase shift and roll over of those sequences prior to computing the positions of the glyphs that encode those sequences relative to the X-axis of the address space.
Focusing for a moment on FIG. 4, it will be seen that glyph encodings of maximal length bit sequences which define the X and Y coordinates of the address space may be interleaved on each of a set of parallel lines of the glyph code pattern. As illustrated, the phase of the "Y" sequence is incrementally shifted to the right on each line of the code pattern, so the relative phases of the interleaved "X" and "Y" sequences that are encoded on the respective lines of the code pattern may be employed, as previously described, to determine the locations of the respective lines of the code pattern relative to the Y-axis of the address space. Furthermore, the process that is described above may be employed to locate the individual glyphs of the code pattern relative to the X-axis of the address space.
Referring to FIG. 5, it will be understood that an interleaved construction of the address space is particularly beneficial for applications in which data encodings, D, or the like are transversely interlaced with the spatial addressing information. For these applications, the addressing information is cyclically encoded at a predetermined fractional duty cycle ratio, such as 1/5 as shown, so an appropriately phased scaling factor is used to compute the location of the encodings of the address information relative to the Y-axis of the address space. Once these locations have been determined, the locations of the data encodings relative to the Y-axis of the address space can also be identified by using the self-clocking properties of the glyph code.
While incremental linear phase shifts of the maximal bit length sequences that define the address space are typically employed to parameterize the address space relative to one axis, such as the Y-axis as described above, incremental arithmetic phase shifts of various type can be employed for that purpose. For example, as shown in FIG. 6, a cumulative arithmetic function is used to cause the relative phase difference between the maximal bit length sequences that are encoded on neighboring lines of the code to directly parameterize the position of one of those lines (i.e., the lower line) relative to the Y-axis of the address space.
Turning now to FIGS. 7 and 8, it will be seen that address spaces that are parameterized relative to one axis by linear incremental phase shifts advantageously are constructed by tiling the maximal length bit sequence or sequences into the glyph code pattern on tiling vectors that map the bit sequences into the code pattern with the desired relative phase shifts. For example, as shown in FIG. 7, the "U" and "V" maximal length bit sequences are tiled into the glyph code pattern on tiling vectors Ux, Uy and Vx, Vy, respectively, which interlace those sequences on alternate parallel lines of the code pattern, while incrementally shifting the "V" sequence one bit index position to the right on every other line of the code pattern. This, of course, creates an address space 31 of the type that is shown in FIG. 2. Indeed, the tiled construction of the address space 31 distributively replicates that space at other locations in the glyph code pattern, such as at 32, thereby providing a distributed redundancy in code patterns that are sufficiently large to encode these multiple instances 31 and 32 of the address space. Note, all of the address codes may be tiling; the ones having fixed line-to-line shifts for each code are "periodic" tilings.
FIG. 8 illustrates a tiled construction where the "U" and "V" maximal length bit sequences are tiled into the glyph code pattern on tiling vectors Ux, Uy and Vx, Vy respectively, which also interleave those sequences on alternate parallel lines of the code pattern. However, unlike the "mono shear" tiled case shown in FIG. 7, in this embodiment that tiling vectors produce a "dual shear" tiling of the sequences U and V, such that those sequences are incrementally phase shifted one sequence index position to the left and right, respectively, on every other line of the code pattern. This tiling creates address spaces 41 and 42 which contain precisely the same members, but the captured members of those address spaces 41 and 42 differ in both their spatial and logical organization, so the organization that best fits a given application can be used.
Turning now to FIG. 9, it will be evident that contiguous and/or non-contiguous non-overlapping fragments Al . . . An of an address space A of the above described type may be written on different substrates 51-53. Each of these fragments Al . . . An must contain a sufficiently large sample of the maximal length bit sequences that parameterized the address space A in the image domain to permit the x/y coordinate pairs for the glyphs they contain to be computed as described above, but they otherwise can be sized as required to best satisfy the needs of a given application. The fragments Al . . . An need not define a complete cover of the address space, but one of the more attractive applications of this feature is to print out contiguous fragments of a large address space A on multiple substrates so that these printed fragments provide an essentially complete cover of the address space A.
C. The Relative Phase of an Interlaced Parallel Propagating Maximal Length Bit Sequences as a Labeling Parameter for Spatial Address Spaces
Referring to FIG. 10, the functionality of address spaces of the foregoing type can be extended by cyclically interlacing (or interleaving) encodings of another parallel propagating maximal length bit sequence L with the encodings of the sequence or sequences, such as U and V, which parameterize the address space 61 with respect to its x/y coordinates. This additional bit sequence L further parameterizes the address space 61 by embedding a machine readable distributed label in it. As shown in FIG. 10, this label is a numeric value which is determined by the incremental phase shift between successive encodings of the sequence L. This phase shift may, of course, be adjusted to selectively embed any one of a plurality of different labels in the address space 61. A look-up table or the like (not shown) can be employed to interpret the embedded label based on its numeric value. In this embodiment, the distributed label L is independently interpretable.
However, as shown in FIGS. 11 and 12, a distributed labeling that requires a computationally less intensive read out of the address space is provided if the encodings of the labeling sequence, r, are referenced to the encodings of one or another of the address defining sequence U or V. This relatively minor change avoids the correlation processing which the embodiment of FIG. 10 requires to latch on to the phase of the reference copy of the labeling sequence.
Turning to FIG. 13, one of the advantages of including a distributed labeling parameter in address spaces of the foregoing type is that the labeling provides a hierarchical mechanism for distinguishing between address spaces that include otherwise identical address parameters. This hierarchical labeling mechanism may be used, for example, to classify the address spaces ALl . . . ALn for various purposes or to index the address spaces ALl . . . ALn into a hierarchically organized look-up table or the like.
D. Further Characterizing N Dimensionally Parameterized Code Pattern By Selection of Parameterizing Code Sequences
It is desirable for some applications to select the maximal length bit sequences that parameterize the glyph code pattern in two dimensions from a family of candidates so that the selection of one or both of those sequences effectively parameterizes (i.e., "labels") the glyph code pattern in accordance with still another metric. However, the computational cost of testing all, or even a significant subset of the maximal bit length sequences that might be candidates for such a selection is likely to be prohibitive.
Thus, as shown in FIG. 14, to reduce the computation cost of implementing this type of address space labeling (or "characterization"), encodings of a prespecified maximal length bit sequence I are interleaved (typically at a 50% duty ratio) with the encodings of the address space parameterizing maximal length bit sequences, X and Y. Accordingly, one or both of the parameterizing sequences X and Y may be selected from a family of potentially suitable sequences to further characterize the address space in accordance with any desired metric. This freedom to select does not significantly reduce the computation cost of interpreting the address space because the relative phase difference between the transversely neighboring instances of the prespecified (i.e., "known") sequence is set to uniquely identify the sequences X and Y that have been selected to parameterize the glyph code pattern in address space.
In the embodiment shown in FIG. 14, neighboring instances of the known sequence I, as well as neighboring instances of the X and Y sequences, are counterpropagating. It, therefore, should be understood that counterpropagating sequences need not be used since the relative phasing of these sequences can be determined as described hereinabove when they propagate in the same direction.
E. Uniquely Identifying physical Objects in Parameterized Address Space
Turning to FIG. 15, it will be seen that machine readable non-overlapping fragments, such as at 85-91, of N-dimensional image domain address spaces of the above-described type, such as at ALl . . . ALn, can be affixed to a variety of two and three dimensional objects, such as at 105-111, to be unique machine readable identifiers of those objects. Typically, these machine readable identifiers (i.e., address space fragments) are registered with the objects to which they are applied in a flat or hierarchically organized look-up table 117 so that a readout of any part of the address space identifier on any of the objects 105-111 provides a pointer for indexing into the look-up table 117. This pointer, in turn, usually causes the look-up table to return and/or pass on predetermined object related information to other system components (not shown).
In practice, the address space fragments 85-91 may be written directly on the objects 105-111, respectively, and/or on other substrates that are subsequently permanently or temporarily affixed to the objects. While a two dimensional address space can be employed for this application, more fully parameterized address spaces, such as the labeled address spaces ALl . . . ALn have the advantage of having a hierarchical organization which may be employed, as shown, to hierarchically organize object identifiers 85-91 by object type or any other desired classification.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5051779 *||Oct 10, 1990||Sep 24, 1991||Fuji Xerox Co., Ltd.||Job control sheet for image processing system|
|US5060980 *||May 30, 1990||Oct 29, 1991||Xerox Corporation||Form utilizing encoded indications for form field processing|
|US5168147 *||Jul 31, 1990||Dec 1, 1992||Xerox Corporation||Binary image processing for decoding self-clocking glyph shape codes|
|US5486686 *||May 18, 1992||Jan 23, 1996||Xerox Corporation||Hardcopy lossless data storage and communications for electronic document processing systems|
|US5625721 *||Apr 6, 1994||Apr 29, 1997||Matsushita Information Technology Laboratory||Certifiable optical character recognition|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US6052486 *||Apr 29, 1999||Apr 18, 2000||Quickbut, Inc.||Protection mechanism for visual link objects|
|US6254007 *||Feb 2, 2000||Jul 3, 2001||The Standard Register Company||Security image element tiling scheme|
|US6296192 *||Dec 16, 1999||Oct 2, 2001||Xerox Corporation||Machine-readable record with a two-dimensional lattice of synchronization code interleaved with data code|
|US6310988||Aug 31, 1998||Oct 30, 2001||Xerox Parc||Methods and apparatus for camera pen|
|US6327395||Aug 31, 1998||Dec 4, 2001||Xerox Parc||Glyph address carpet methods and apparatus for providing location information in a multidimensional address space|
|US6330976||Mar 25, 1999||Dec 18, 2001||Xerox Corporation||Marking medium area with encoded identifier for producing action through network|
|US6502756||May 26, 2000||Jan 7, 2003||Anoto Ab||Recording of information|
|US6570104||May 26, 2000||May 27, 2003||Anoto Ab||Position determination|
|US6594406||Dec 31, 1998||Jul 15, 2003||Xerox Corporation||Multi-level selection methods and apparatus using context identification for embedded data graphical user interfaces|
|US6667695||Jun 25, 2002||Dec 23, 2003||Anoto Ab||Position code|
|US6674427||Oct 2, 2000||Jan 6, 2004||Anoto Ab||Position determination II—calculation|
|US6752317||Oct 9, 2001||Jun 22, 2004||Xerox Corporation||Marking medium area with encoded identifier for producing action through network|
|US6783069||Feb 4, 2000||Aug 31, 2004||Xerox Corporation||Method and apparatus for implementing a camera mouse|
|US6843420 *||Nov 12, 2002||Jan 18, 2005||Silverbrook Research Pty Ltd||Identity-coded surface with reference points and coded marks|
|US7017823||Nov 12, 2004||Mar 28, 2006||Silverbrook Research Pty Ltd||Region encoding using a plurality of tags|
|US7025276||Nov 12, 2004||Apr 11, 2006||Silverbrook Research Pty Ltd||Region encoding using substantially undifferentiated marks|
|US7048198||Apr 22, 2004||May 23, 2006||Microsoft Corporation||Coded pattern for an optical device and a prepared surface|
|US7055739 *||May 23, 2000||Jun 6, 2006||Silverbrook Research Pty Ltd||Identity-coded surface with reference points|
|US7077333 *||Jul 6, 2004||Jul 18, 2006||Silverbrook Research Pty Ltd||Position-identifying coded pages|
|US7116840||Oct 31, 2002||Oct 3, 2006||Microsoft Corporation||Decoding and error correction in 2-D arrays|
|US7145556||Oct 29, 2002||Dec 5, 2006||Anoto Ab||Method and device for decoding a position-coding pattern|
|US7175095||Sep 13, 2002||Feb 13, 2007||Anoto Ab||Coding pattern|
|US7176896||Aug 30, 2000||Feb 13, 2007||Anoto Ab||Position code bearing notepad employing activation icons|
|US7248250||Oct 20, 2003||Jul 24, 2007||Anoto Ab||Orientation discrimination in a position-coding pattern|
|US7290719||Feb 17, 2006||Nov 6, 2007||Microsoft Corporation||Coded pattern for an optical device and a prepared surface|
|US7330605||Sep 6, 2006||Feb 12, 2008||Microsoft Corporation||Decoding and error correction in 2-D arrays|
|US7386191||Sep 6, 2006||Jun 10, 2008||Microsoft Corporation||Decoding and error correction in 2-D arrays|
|US7430497||Oct 31, 2002||Sep 30, 2008||Microsoft Corporation||Statistical model for global localization|
|US7445160||Jun 14, 2006||Nov 4, 2008||Hewlett-Packard Development Company, L.P.||Position location using error correction|
|US7486822||Dec 29, 2006||Feb 3, 2009||Microsoft Corporation||Active embedded interaction coding|
|US7486823||Dec 29, 2006||Feb 3, 2009||Microsoft Corporation||Active embedded interaction coding|
|US7502507||Oct 31, 2002||Mar 10, 2009||Microsoft Corporation||Active embedded interaction code|
|US7502508||Mar 22, 2006||Mar 10, 2009||Microsoft Corporation||Active embedded interaction coding|
|US7549595||Dec 3, 2002||Jun 23, 2009||Silverbrook Research Pty Ltd||Rotationally symmetric tags|
|US7564605||Feb 26, 2004||Jul 21, 2009||Silverbrook Research Pty Ltd||Symmetric tags|
|US7570813||Aug 27, 2007||Aug 4, 2009||Microsoft Corporation||Strokes localization by m-array decoding and fast image matching|
|US7580576||Jun 2, 2005||Aug 25, 2009||Microsoft Corporation||Stroke localization and binding to electronic document|
|US7583842||Jan 6, 2004||Sep 1, 2009||Microsoft Corporation||Enhanced approach of m-array decoding and error correction|
|US7599560||Apr 22, 2005||Oct 6, 2009||Microsoft Corporation||Embedded interaction code recognition|
|US7607076||Feb 18, 2005||Oct 20, 2009||Microsoft Corporation||Embedded interaction code document|
|US7619607||Jun 30, 2005||Nov 17, 2009||Microsoft Corporation||Embedding a pattern design onto a liquid crystal display|
|US7622182||Aug 17, 2005||Nov 24, 2009||Microsoft Corporation||Embedded interaction code enabled display|
|US7639885||Jun 2, 2008||Dec 29, 2009||Microsoft Corporation||Decoding and error correction in 2-D arrays|
|US7672513||Apr 29, 2004||Mar 2, 2010||Anoto Ab||Methods, apparatus, computer program and storage medium for position decoding|
|US7684618||Mar 22, 2006||Mar 23, 2010||Microsoft Corporation||Passive embedded interaction coding|
|US7710408||Dec 22, 2000||May 4, 2010||Anoto Ab||Centralized information management based upon position information|
|US7729539||May 31, 2005||Jun 1, 2010||Microsoft Corporation||Fast error-correcting of embedded interaction codes|
|US7806342 *||Jul 18, 2006||Oct 5, 2010||Silverbrook Research Pty Ltd||Product item having first coded data and random pattern|
|US7817816||Aug 17, 2005||Oct 19, 2010||Microsoft Corporation||Embedded interaction code enabled surface type identification|
|US7826074 *||Feb 25, 2005||Nov 2, 2010||Microsoft Corporation||Fast embedded interaction code printing with custom postscript commands|
|US7856554||Jul 18, 2006||Dec 21, 2010||Silverbrook Research Pty Ltd||Method of authenticating an object|
|US7874494 *||Jul 18, 2006||Jan 25, 2011||Silverbrook Research Pty Ltd||Product item having first coded data and unique identifier|
|US7878416||Nov 30, 2009||Feb 1, 2011||Silverbrook Research Pty Ltd||Product item registration|
|US7899708||Jul 18, 2006||Mar 1, 2011||Silverbrook Research Pty Ltd||Method of transacting objects|
|US7900833 *||Feb 24, 2010||Mar 8, 2011||Silverbrook Research Pty Ltd||Product item having location-indicating coded data and RFID tag|
|US7907795||Jul 2, 2007||Mar 15, 2011||Canon Kabushiki Kaisha||Two-dimensional measurement system|
|US7920753||Jun 12, 2008||Apr 5, 2011||Microsoft Corporation||Preprocessing for information pattern analysis|
|US7950588||Jun 23, 2005||May 31, 2011||Anoto Ab||Coding and decoding of data|
|US7980480 *||Jul 24, 2008||Jul 19, 2011||Silverbrook Research Pty Ltd||Method of imaging a coding pattern having registration symbols|
|US7982929||May 31, 2009||Jul 19, 2011||Siverbrook Research Pty Ltd||Method of sensing symmetric coded tags|
|US7984858||May 31, 2009||Jul 26, 2011||Silverbrook Research Pty Ltd||Coded data pattern having redundantly-encoded orientation|
|US7991153||Aug 26, 2008||Aug 2, 2011||Nanoglyph, LLC||Glyph encryption system and related methods|
|US7992793 *||Jul 24, 2008||Aug 9, 2011||Silverbrook Research Pty Ltd||Method of imaging coding pattern and identifying cell translations from different orientations|
|US7999798||Sep 14, 2006||Aug 16, 2011||Anoto Ab||Method and device for decoding a position-coding pattern|
|US8006914 *||Dec 20, 2010||Aug 30, 2011||Silverbrook Research Pty Ltd||Method of identifying object using portion of random pattern identified via fiducial|
|US8028907||Jun 8, 2010||Oct 4, 2011||Silverbrook Research Pty Ltd||Method of recording receipt of shipped item|
|US8064086||Jul 12, 2010||Nov 22, 2011||Silverbrook Research Pty Ltd||System for electronically capturing information|
|US8074891||Jun 16, 2006||Dec 13, 2011||Anoto Ab||Coding and decoding methods and apparatuses|
|US8091792||Jul 24, 2008||Jan 10, 2012||Silverbrook Research Pty Ltd||Coding pattern comprising direction codes|
|US8118235||Jan 19, 2009||Feb 21, 2012||Silverbrook Research Pty Ltd||Coding pattern comprising reed-solomon codewords encoded by mixed multi-pulse position modulation|
|US8136720||Sep 22, 2008||Mar 20, 2012||Silverbrook Research Pty Ltd||Method of recording mail transactions|
|US8156153||Jul 25, 2008||Apr 10, 2012||Microsoft Corporation||Global metadata embedding and decoding|
|US8162220||Aug 6, 2009||Apr 24, 2012||Anoto Ab||Product provided with a coding pattern and apparatus and method for reading the pattern|
|US8181885||Jul 24, 2008||May 22, 2012||Silverbrook Research Pty Ltd||Method of imaging a coding pattern having an orientation identified via a plurality of direction components|
|US8194976||Sep 22, 2008||Jun 5, 2012||Hewlett-Packard Development Company, L.P.||Machine readable documents and reading methods|
|US8215566||Jun 16, 2011||Jul 10, 2012||Silverbrook Research Pty Ltd||System for imaging and decoding coded data pattern using redundantly-encoded orientation|
|US8347097||Jul 18, 2006||Jan 1, 2013||Silverbrook Research Pty Ltd||Object identifier protected from tampering|
|US8387889 *||Aug 2, 2011||Mar 5, 2013||Silverbrook Research Pty Ltd||Object comprising coded data and randomly dispersed ink taggant|
|US8416463||Mar 19, 2008||Apr 9, 2013||Anoto Ab||Printing of a position-coding pattern|
|US8430315||Jun 29, 2010||Apr 30, 2013||SignaKey LLC||Data encoding and decoding|
|US8534566||Apr 5, 2012||Sep 17, 2013||Anoto Ab||Product provided with a coding pattern and apparatus and method for reading the pattern|
|US9304605||Dec 15, 2008||Apr 5, 2016||Anoto Ab||General information management system|
|US20020020750 *||Oct 9, 2001||Feb 21, 2002||Xerox Corporation||Marking medium area with encoded identifier for producing action through network|
|US20020091711 *||Dec 22, 2000||Jul 11, 2002||Petter Ericson||Centralized information management|
|US20030061188 *||Dec 22, 2000||Mar 27, 2003||Linus Wiebe||General information management system|
|US20030066896 *||Sep 13, 2002||Apr 10, 2003||Pettersson Mats Peter||Coding pattern|
|US20030128194 *||Oct 29, 2002||Jul 10, 2003||Pettersson Mats Petter||Method and device for decoding a position-coding pattern|
|US20040085287 *||Oct 31, 2002||May 6, 2004||Microsoft Corporation||Decoding and error correction in 2-D arrays|
|US20040085302 *||Oct 31, 2002||May 6, 2004||Microsoft Corporation||Statistical model for global localization|
|US20040086181 *||Oct 31, 2002||May 6, 2004||Microsoft Corporation||Active embedded interaction code|
|US20040113893 *||Oct 20, 2003||Jun 17, 2004||Anoto Ab||Position determination II - calculation|
|US20040174577 *||Feb 26, 2004||Sep 9, 2004||Paul Lapstun||Symmetric tags|
|US20040245345 *||Jul 6, 2004||Dec 9, 2004||Silverbrook Research Pty Ltd||Position-identifying coded pages|
|US20050064502 *||Nov 12, 2004||Mar 24, 2005||Paul Lapstun||Region encoding using a plurality of tags|
|US20050064503 *||Nov 12, 2004||Mar 24, 2005||Paul Lapstun||Region encoding using substantially undifferentiated marks|
|US20050104861 *||Oct 20, 2003||May 19, 2005||Anoto Ab||Position determination II - calculation|
|US20050236492 *||Apr 22, 2004||Oct 27, 2005||Microsoft Corporation||Coded pattern for an optical device and a prepared surface|
|US20060146069 *||Dec 3, 2002||Jul 6, 2006||Silerbrook Research Pty Ltd||Rotationally symmetric tags|
|US20060151621 *||Feb 17, 2006||Jul 13, 2006||Microsoft Corporation||Coded pattern for an optical device and a prepared surface|
|US20060165290 *||Mar 22, 2006||Jul 27, 2006||Microsoft Corporation||Active embedded interaction coding|
|US20060239505 *||Apr 29, 2004||Oct 26, 2006||Andreas Bjorklund||Methods, apparatus, computer program and storage medium for position decoding|
|US20070003169 *||Sep 6, 2006||Jan 4, 2007||Microsoft Corporation||Decoding and Error Correction In 2-D Arrays|
|US20070017985 *||Jul 18, 2006||Jan 25, 2007||Silverbrook Research Pty Ltd.||Object identifier protected from tampering|
|US20070022045 *||Jul 18, 2006||Jan 25, 2007||Silverbrook Research Pty Ltd.||Method of transacting objects|
|US20070022294 *||Jul 18, 2006||Jan 25, 2007||Silverbrook Research Pty Ltd||Method of authenticating an object|
|US20070064818 *||Sep 14, 2006||Mar 22, 2007||Anoto Ab||Method and device for decoding a position-coding pattern|
|US20070104371 *||Dec 29, 2006||May 10, 2007||Microsoft Corporation||Active embedded interaction coding|
|US20070104372 *||Dec 29, 2006||May 10, 2007||Microsoft Corporation||Active embedded interaction coding|
|US20070108285 *||Jul 18, 2006||May 17, 2007||Silverbrook Research Pty Ltd||Product item having coded data identifying a layout|
|US20070272750 *||Jun 23, 2005||Nov 29, 2007||Andreas Bjorklund||Coding and Decoding of Data|
|US20080049268 *||Jul 2, 2007||Feb 28, 2008||Canon Kabushiki Kaisha||Two-dimensional measurement system|
|US20090019292 *||Oct 10, 2005||Jan 15, 2009||Bjorn Erik Fransson||Secure management of information|
|US20090045250 *||Sep 22, 2008||Feb 19, 2009||Silverbrook Research Pty Ltd||Method of recording mail transactions|
|US20090065266 *||Nov 18, 2008||Mar 12, 2009||Silverbrook Research Pty Ltd||Method of instructing a computer to execute a command|
|US20090078475 *||Jun 16, 2006||Mar 26, 2009||Petter Ericson||Coding and Decoding Methods and Apparatuses|
|US20090078768 *||Jul 24, 2008||Mar 26, 2009||Silverbrook Research Pty Ltd||Method of imaging a coding pattern having an orientation identified via a plurality of direction components|
|US20090078779 *||Jul 24, 2008||Mar 26, 2009||Silverbrook Research Pty Ltd||Coding pattern comprising direction codes|
|US20090078780 *||Jul 24, 2008||Mar 26, 2009||Silverbrook Research Pty Ltd||Coding pattern comprising registration symbols|
|US20090082972 *||Jul 24, 2008||Mar 26, 2009||Silverbrook Research Pty Ltd||Coding pattern having cell translations identifiable in different orientations|
|US20090103803 *||Sep 22, 2008||Apr 23, 2009||Anil Kumar||Machine readable documents and reading methods|
|US20090182527 *||Dec 15, 2008||Jul 16, 2009||Anoto Aktiebolag (Anoto Ab)||General information management system|
|US20090204821 *||Apr 12, 2007||Aug 13, 2009||Bjoern Fransson||Data protection mechanism|
|US20090206166 *||Jan 19, 2009||Aug 20, 2009||Silverbrook Research Pty Ltd||Coding pattern comprising reed-solomon codewords encoded by mixed multi-pulse position modulation|
|US20090236423 *||May 31, 2009||Sep 24, 2009||Silverbrook Research Pty Ltd||Method of sensing symmetric coded tags|
|US20090236427 *||May 31, 2009||Sep 24, 2009||Silverbrook Research Pty Ltd||Coded data pattern having redundantly-encoded orientation|
|US20090262569 *||Oct 17, 2008||Oct 22, 2009||Naoharu Shinozaki||Semiconductor memory device with stacked memory cell structure|
|US20100072275 *||Nov 30, 2009||Mar 25, 2010||Silverbrook Research Pty Ltd||Product item registration|
|US20100096458 *||Aug 6, 2009||Apr 22, 2010||Anoto Aktiebolag (Anoto Ab)||Product provided with a coding pattern and apparatus and method for reading the pattern|
|US20100134848 *||Mar 19, 2008||Jun 3, 2010||Stefan Lynggaard||Printing of a position-coding pattern|
|US20100140352 *||Jan 19, 2010||Jun 10, 2010||Silverbrook Research Pty Ltd||Method Of Updating Product Status|
|US20100243727 *||Jun 8, 2010||Sep 30, 2010||Silverbrook Research Pty Ltd||Method of recording receipt of shipped item|
|US20100277768 *||Jul 12, 2010||Nov 4, 2010||Silverbrook Research Pty Ltd||System for electronically capturing information|
|US20110084130 *||Dec 20, 2010||Apr 14, 2011||Silverbrook Research Pty Ltd||Method of identifying object using portion of random pattern identified via fiducial|
|US20110176178 *||Mar 30, 2011||Jul 21, 2011||Silverbrook Research Pty Ltd||System for generating printed interface surface|
|US20110226862 *||May 30, 2011||Sep 22, 2011||Silverbrook Research Pty Ltd||Surface bearing coded data|
|CN1499440B||Sep 29, 2003||Feb 13, 2013||微软公司||Decode in 2-D array and error correction|
|CN100392673C||Dec 3, 2002||Jun 4, 2008||西尔弗布鲁克研究有限公司||Rotationally symmetric tags|
|CN100442215C||Sep 29, 2003||Dec 10, 2008||微软公司||Decoding and error correction in 2-d arrays|
|EP0984390A2 *||Aug 27, 1999||Mar 8, 2000||Xerox Corporation||Apparatus for providing location information in a multidimensional address space|
|EP1016953A3 *||Dec 24, 1999||Sep 26, 2001||Xerox Corporation||Multi-level selection methods and apparatus using context identification|
|EP1107171A3 *||Dec 4, 2000||Nov 27, 2002||Xerox Corporation||Method and apparatus for implementing a camera mouse|
|EP1416435A2 *||Sep 18, 2003||May 6, 2004||Microsoft Corporation||Decoding and error correction in 2-D arrays|
|EP1416435A3 *||Sep 18, 2003||Nov 2, 2005||Microsoft Corporation||Decoding and error correction in 2-D arrays|
|EP1557793A2 *||Dec 4, 2000||Jul 27, 2005||Xerox Corporation||Method and apparatus for registering, displaying and decoding of information for spatial registration|
|WO2004051557A1 *||Dec 3, 2002||Jun 17, 2004||Silverbrook Research Pty Ltd||Rotationally symmetric tags|
|WO2004079642A1 *||Feb 27, 2004||Sep 16, 2004||Silverbrook Research Pty Ltd||Symmetric tags|
|WO2005024701A2 *||Aug 27, 2004||Mar 17, 2005||Hewlett-Packard Development Company, L.P.||Creation of documents with position identification pattern|
|WO2005024701A3 *||Aug 27, 2004||Apr 28, 2005||Hewlett Packard Development Co||Creation of documents with position identification pattern|
|U.S. Classification||382/306, 235/494, 358/403, 235/454, 382/232, 235/487, 235/456|
|International Classification||G06K7/14, G06K1/12, G06K7/00, G06K19/06|
|Cooperative Classification||G06K7/14, G06K19/06037|
|European Classification||G06K19/06C3, G06K7/14|
|Dec 20, 1996||AS||Assignment|
Owner name: XEROX CORPORATION, CONNECTICUT
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PETRIE, GLEN W.;HECHT, DAVID L.;REEL/FRAME:008374/0476
Effective date: 19961220
|Jun 28, 2002||AS||Assignment|
Owner name: BANK ONE, NA, AS ADMINISTRATIVE AGENT, ILLINOIS
Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:013153/0001
Effective date: 20020621
|Dec 11, 2002||FPAY||Fee payment|
Year of fee payment: 4
|Oct 31, 2003||AS||Assignment|
Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT, TEXAS
Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:015134/0476
Effective date: 20030625
Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT,TEXAS
Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:015134/0476
Effective date: 20030625
|Dec 13, 2006||FPAY||Fee payment|
Year of fee payment: 8
|Dec 14, 2010||FPAY||Fee payment|
Year of fee payment: 12